Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

296 results about "Fuzz testing" patented technology

Fuzzing or fuzz testing is an automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program. The program is then monitored for exceptions such as crashes, failing built-in code assertions, or potential memory leaks. Typically, fuzzers are used to test programs that take structured inputs. This structure is specified, e.g., in a file format or protocol and distinguishes valid from invalid input. An effective fuzzer generates semi-valid inputs that are "valid enough" in that they are not directly rejected by the parser, but do create unexpected behaviors deeper in the program and are "invalid enough" to expose corner cases that have not been properly dealt with.

Fuzz testing method based on static detection

The invention belongs to the technical field of network security, and relates to a fuzz testing method based on static detection. The method comprises source code static analysis and executable code fuzz testing. According to the method, firstly, target software is subjected to static analysis through source code static analysis related software, and fuzz testing is carried out to obtain a static analysis result, then, code segments considered to have problems through the static analysis are subjected to pile inserting marking, and finally, testing cases are subjected to variation on the basis of the pile inserting marking, so that the testing cases can cover all code segments with problems. The fuzz testing method has the advantages that the advantages of the static detection and the fuzz testing are combined, the static detection is verified through the fuzz testing, and the false alarm condition of the static detection is excluded; on the other hand, the fuzz testing is guided by the static detection result, so that random testing cases used by the fuzz testing have a higher pertinence, and the fuzz testing efficiency is improved. The defects of high false alarm rate, low detection efficiency and the like of the traditional method adopting the random testing cases for testing are overcome.
Owner:706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND

Distributed heterogeneous network vulnerability mining method based on Fuzzing algorithm

InactiveCN107046526AGood modelingValid data representationTransmissionNetworking protocolTest script
The invention relates to a distributed heterogeneous network vulnerability mining method based on the Fuzzing algorithm. The method comprises the following steps: performing automatic analysis on a network protocol of a test target, and determining protocol key information of the test target; performing comprehensive description on the protocol key information, combining the protocol key information into a specific data structure, and constructing a protocol test script; combining operation states of the protocol into a protocol vulnerability mining path map according to the protocol test script; sending a test script to the test target according to the protocol vulnerability mining path map and a control instruction, sending the control instruction to a target monitor, and receiving monitoring information from the target monitor; and storing the sent test script and the tested vulnerability information, and displaying the same in an information display interface. By adoption of the distributed heterogeneous network vulnerability mining method provided by the invention, the coverage and validity of protocol mining are improved, and the leakage probability of the vulnerability is reduced; and a friendly operation interface is provided to display corresponding information in real time, thereby facilitating the user check ad reducing the entry threshold of vulnerability mining.
Owner:BEIJING UNIV OF POSTS & TELECOMM +1

Fabric fuzzing and pilling image segmentation method based on wavelet transformation and morphological algorithm

The invention discloses a fabric fuzzing and pilling image segmentation method based on wavelet transformation and the morphological algorithm. The method comprises the steps that firstly, histogram equalization is carried out on an acquired fabric fuzzing and pilling image, and eight-stage multi-resolution wavelet decomposition is carried out; secondly, after the coefficient of a first-stage wavelet decomposition layer, the coefficient of a second-stage wavelet decomposition layer and the coefficient of an approximate wavelet decomposition layer are set to be zero, the image is reconstructed, wherein the first-stage wavelet decomposition layer and the second-stage wavelet decomposition layer express the highest-frequency information, and the approximate wavelet decomposition layer expresses low-frequency information; thirdly, binaryzation is carried out on the constructed image according to the maximum between-cluster variance method, and erosion is carried out on the image through a horizontal linear structure element, a 45-degree linear structure element, a vertical linear structure element and a 135-degree linear structure element in sequence; fourthly, dilation is carried out on the eroded image through structure elements with the sequence opposite to that of the structure elements applied to erosion, namely, the 135-degree linear structure element, the vertical linear structure element, the 45-degree linear structure element and the horizontal linear structure element in sequence. By means of the method, the influence of the texture of fabric, illumination unevenness, the surface roughness of the fabric and the size difference and shape difference of fuzzy balls on fuzzing and pilling grade assessment on the fabric can be effectively avoided.
Owner:江苏世纪燎原针织有限公司

PLC firmware fuzz testing system and method based on stain analysis

The invention relates to the field of industrial control system safety, in particular to a PLC firmware fuzz testing system and method based on stain analysis. The testing system comprises a simulation environment end and a fuzz testing end, the fuzz testing end can be used for constructing a normal network data package and a fuzz testing case, and a communication link is established between the fuzz testing end and the simulation environment end; the simulation environment end comprises a simulation platform and a sub module; the sub module comprises a network card, a control module, a stainsource marking module, a stain tracking module, a sensitive word field determination module and an abnormity monitoring and recording module. According to the PLC firmware fuzz testing system and method, PLC firmware is used as a research object, by combining with a stain analysis and fuzz testing method, a network protocol data package which is input to a PLC is subjected to stain source markingand stain analysis under a simulation mode, and according to a data package sensitive word field which is marked in the stain analysis process, precise data variation is conducted, the fuzz testing case is constructed, and accordingly the pertinency and penetrability of fuzz testing for the PLC firmware are improved.
Owner:湖南优利泰克自动化系统有限公司 +1

Automatic vulnerability detection plugin generation method and system for industrial control system

The invention discloses an automatic vulnerability detection plugin generation method and system for an industrial control system. A current industrial control system vulnerability mining technology Fuzzing can find vulnerability but can not perform further processing on a vulnerability plugin. The method disclosed by the invention comprises a Fuzzing test link, a vulnerability playback link and avulnerability collecting link, the Fuzzing test link comprises the following sequential steps: constructing data sources and performing data storage; acquiring the data sources, starting to perform Fuzzing scanning, and mining vulnerability; monitoring a mining process; if all the data sources are completely polled and no problem is triggered, finishing the mining process; if a problem is triggered, acquiring node IDs of the data sources, and entering the vulnerability playback link; and the vulnerability playback link comprises the following sequential steps: generating the data sources andacquiring node information; acquiring the data sources, and starting to perform the Fuzzing scanning; and if no problem exists after verification, finishing, and if a problem exists, entering the vulnerability collecting link. The method disclosed by the invention can automatically generate a vulnerability detection plugin, converts unknown vulnerability into known vulnerability and improves vulnerability mining efficiency.
Owner:ELECTRIC POWER RES INST OF STATE GRID ZHEJIANG ELECTRIC POWER COMAPNY +1

Reflective vulnerability detection method based on static and dynamic combination

The invention provides a reflective vulnerability detection method based on static and dynamic combination, which is a reflective XSS vulnerability detection method combining static stain propagationand dynamic Fuzzing test. Existing vulnerability detection is based on detection methods such as a single stain analysis or a genetic algorithm, and the stain analysis often uses a method combined with HTTP request packet interception analysis processing to track user's sensitive information and private data to prevent a malicious program code from being sent to a third party, which causes the leakage of user data. While the traditional genetic algorithm only contains the basic genetic operations of selection, crossover and mutation, only an approximate global optimal solution can be found dueto the inherent defects of the genetic algorithm in practice, but the global optimal solution cannot be guaranteed to be converged. The method simultaneously uses a randomization algorithm and a fuzzy test method to automatically detect the vulnerability while utilizing a static analysis source code and a stain propagation method to narrow the search range of the reflective XSS vulnerability, sothat the detection efficiency is high, and the method is highly feasible.
Owner:NANJING UNIV OF POSTS & TELECOMM

Sample format protection method and device for gray box fuzzy test

The invention discloses a sample format protection method and device for a gray box fuzzy test. The sample format protection method comprises the steps of training a machine learning model to enable the model to recognize the correctness of the format of a testing corpus; when the fuzzy test is conducted on a program, obtaining an initial corpus from a corpus set and mutating the initial corpus toobtain the testing corpus; using the testing corpus to conduct the fuzzy test on the program, and in the process of the fuzzy test, determining whether the format of the testing corpus is correct ornot through the model. When the format of the testing corpus is correct and the testing corpus covers a program code uncovered by an existing testing corpus, the testing corpus is added into the corpus set, and the process is repeated. In this way, the corpuses, with the correct format, determined in each fuzzy test is added into the corpus set, the correctness of the formats of the corpuses in the corpus set is guaranteed to the greatest extent, and the efficiency of the fuzzy test is improved. Moreover, through a position set, the mutation of the initial corpus is guided, an invalid mutationoperation is avoided, and the testing efficiency is further improved.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products